Domain names and the PABP

Table of Content

Domains As a business that is entering into the web business and having the ability to receive payment from Credit Cards negates that the business now complies with some standards that secures all of the customers information from misuse and inappropriate access from unauthorized persons.. To do this some logical approaches and best practices have been proven to facilitate a business meeting the PC ADS standards. These best practices start with a simple install of a firewall that isolates the business’ network from unauthorized outside access to the customer’s information.

Also, make SUre that all defaults setting on the network are changed as the default information is a generally known value and easy to bypass security if not changed. (Gibson, 2011) These are generally good practices for security on any network anyway, but definitely a good start to achieving the PC ADS standard. Once these measures are taken, it is now important to protect the data that you are using from the customer to complete a purchases. The best way is to setup access control measure within the LANA and that the LANA to WAN interface is protected by a firewall.

This essay could be plagiarized. Get your custom essay
“Dirty Pretty Things” Acts of Desperation: The State of Being Desperate
128 writers

ready to help you now

Get original paper

Without paying upfront

When using the information to authorize outside of the LANA environment it is important to protect the information by encrypting the data being sent to the authorizing entity. By doing this you can further protect the information stored at your business from unwanted access and viewing. Within the business itself physical access control is another way to further protect the data. Doing this physical access control will limit the access within the business by unauthorized employees. Gibson, 2011) Next, and not to be overlooked, a policy needs to be created that will setup the business to a lifestyle within that is setup to protect this information at all times. This policy should also contain a plan to develop and maintain a Vulnerability Management Program. This program should contain the information pertaining to keeping the Anti Virus information up to date and how the business will develop and maintain a secure network environment. Gibson, 2011) It also will provide the ways the business will test and evaluate the effectiveness of this plan and setup within your network. It also will show how the business will report and log the data pertaining to these measures. This will give the business a real timely look at the ways the informational security is Ewing applied and maintained to secure all of the information contained as well as the customer information that will keep the business compliant to the PC ADS standards in commerce.

So looking at these few steps, the business can create a simple best practice environment within the employ base and the business as a whole from the onset. These best practices also will keep compliance to the PC ADS standard up to date and the security and trust of the customer base and the business.

Cite this page

Domain names and the PABP. (2018, Jun 19). Retrieved from

Remember! This essay was written by a student

You can get a custom paper by one of our expert writers

Order custom paper Without paying upfront